How not to prove your election outcome

被引:24
作者
Haines, Thomas [1 ]
Lewis, Sarah Jamie [2 ]
Pereira, Olivier [3 ]
Teague, Vanessa [4 ]
机构
[1] Norwegian Univ Sci & Technol, Trondheim, Norway
[2] Open Privacy Res Soc, Vancouver, BC, Canada
[3] UCLouvain, ICTEAM, B-1348 Louvain La Neuve, Belgium
[4] Univ Melbourne, Sch Comp & Informat Syst, Melbourne, Vic, Australia
来源
2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2020) | 2020年
关键词
D O I
10.1109/SP40000.2020.00048
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Scytl/SwissPost e-voting solution was intended to provide complete verifiability for Swiss government elections. We show failures in both individual verifiability and universal verifiability (as defined in Swiss Federal Ordinance 161.116), based on mistaken implementations of cryptographic components. These failures allow for the construction of "proofs" of an accurate election outcome that pass verification though the votes have been manipulated. Using sophisticated cryptographic protocols without a proper consideration of what properties they offer, and under which conditions, can introduce opportunities for undetectable fraud even though the system appears to allow verification of the outcome. Our findings are immediately relevant to systems in use in Switzerland and Australia, and probably also elsewhere.
引用
收藏
页码:644 / 660
页数:17
相关论文
共 20 条
  • [1] [Anonymous], 1996, HDB APPL CRYPTOGRAPH
  • [2] [Anonymous], 2013, 186-4: Federal information processing standards publication. Digital Signature Standard (DSS), P20899
  • [3] Bayer S, 2012, LECT NOTES COMPUT SC, V7237, P263, DOI 10.1007/978-3-642-29011-4_17
  • [4] Bernhard D, 2012, LECT NOTES COMPUT SC, V7658, P626, DOI 10.1007/978-3-642-34961-4_38
  • [5] Chaum D., 1993, Advances in Cryptology - CRYPTO '92. 12th Annual International Cryptology Conference Proceedings, P89
  • [6] Cohen J. D., 1985, 26th Annual Symposium on Foundations of Computer Science (Cat. No.85CH2224-4), P372, DOI 10.1109/SFCS.1985.2
  • [7] Cramer R., 1994, Advances in Cryptology - CRYPTO '94. 14th Annual International Cryptology Conference. Proceedings, P174
  • [8] A PUBLIC KEY CRYPTOSYSTEM AND A SIGNATURE SCHEME BASED ON DISCRETE LOGARITHMS
    ELGAMAL, T
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1985, 31 (04) : 469 - 472
  • [9] A Shuffle Argument Secure in the Generic Model
    Fauzi, Prastudy
    Lipmaa, Helger
    Zajac, Michal
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT II, 2016, 10032 : 841 - 872
  • [10] HOW TO PROVE YOURSELF - PRACTICAL SOLUTIONS TO IDENTIFICATION AND SIGNATURE PROBLEMS
    FIAT, A
    SHAMIR, A
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1987, 263 : 186 - 194